You are safe with ICTK
History



We Protect Your Values!

2022 Go to MarketLG Uplus teams up with ICTK Holdings to develop hacking prevention technology for intelligent CCTVs


[Courtesy of LG Uplus]


SEOUL -- South Korea’s mobile carrier LG Uplus has developed a solution capable of thwarting an hacking attack on intelligent closed-circuit television cameras. The solution will be applied first to intelligent CCTVs used by small business owners.


Intelligent CCTVs analyze various images to distinguish physical appearances or detect emergencies. However, video images containing sensitive personal information can be leaked through hacking. 


In cooperation with ICTK Holdings, a security company specialized in internet of things (IoT), LG Uplus (LGU+) has developed a solution using a physically unclonable function (PUF) that was applied to a virtual private network (VPN) between CCTVs and servers to prevent hacking and safely deliver videos through security authentication in several stages.

PUFs provide a physically defined "digital fingerprint" output that serves as a unique identifier. Often based on unique physical variations which occur naturally during semiconductor manufacturing, PUFs are implemented in integrated circuits and are typically used in applications with high-security requirements.

LGU+ would complete the demonstration of its new technology by October 2022. Afterwards, a PUF VPN infrastructure that can handle 100,000 CCTV cameras will be set up for commercialization at an internet data center in western Seoul.


"PUF VPN will be applied not only to CCTVs but also to other services, and we will continue to make efforts to secure VPN security technology with quantum-resistant cryptography within the year so that customers can trust and use the service," LGU+'s corporate service development lab head Jeon Young-seo said in a statement on June 23.

In April 2022, LGU+ launched South Korea's first commercial service of quantum-resistant cryptography that provides an optimal network for customers who require security services that can safely protect data from external threats.

As different passwords are used for all IT-related hardware and software with many companies storing and processing numerous big data, a system to prevent the risk of hacking is important. Data encoded in a quantum state is virtually unhackable without quantum keys which are basically random number tables used to decipher encrypted information. Even though current, publicly known, experimental quantum computers lack the processing power to break any real cryptographic algorithm, cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat.

Kim Joo-heon Reporteremail : jhkim123@ajunews.com

© Aju Business Daily & www.ajunews.com Copyright: All materials on this site may not be reproduced, distributed, transmitted, displayed, published or broadcast without the authorization from the Aju News Corporation.

 

To read more:

https://www.ajudaily.com/view/20220623130244398








Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >



We do these things.
PUF Technology



What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.

Resource
  Product

Resource

Product

News